________________may be forced for flooding traffic to all VLAN ports allowing interception of data through any device that is connected to a VLAN.
(a) Switches
(b) Routers
(c) Hubs
(d) Repeaters
The question was asked in class test.
This interesting question is from Network Models in section Understanding Network Models for Security of Cyber Security
Select the correct answer from above options
Cyber Security questions and answers, Cyber Security questions pdf, Cyber Security question bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,